MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks
|
|
- Gwendolyn Todd
- 6 years ago
- Views:
Transcription
1 2012 IEEE 15th International Conference on Computational Science and Engineering MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks Wouter van Kleunen, Nirvana Meratnia, Paul J.M. Havinga Pervasive Systems, University of Twente 7522 NB Enschede, The Netherlands (w.a.p.vankleunen, n.meratnia, p.j.m.havinga)@utwente.nl Abstract In this paper we describe a design for an underwater MAC protocol which combines localization, time-synchronisation and communication. This protocol is designed for small-scale clustered networks in which all nodes are able to communicate with each other. We consider an integrated design of localization, time-synchronisation and communication important because scheduled communication, localization and time-synchronisation require estimation of propagation delays between nodes to operate accurately and efficiently. For localization we use multidimensional scaling because it does not require the use of reference nodes. Our MAC design consists of two phases, i.e. an unscheduled coordination phase and a communication phase. During the first phase, propagation delays are estimated, relative positions are calculated using multidimensional scaling, and timesynchronisation is performed. During the communication phase, sensor-data is transmitted using scheduled communication. Using simulation we evaluate the feasibility of such a design. By measuring the time required for the coordination phase at different modulation rates, we derive the required modulation rate for acceptable coordination phase times. I. INTRODUCTION Underwater acoustic sensor networks can be used for monitoring the underwater world which have traditionaly been either invisible or was monitored with significant delays and low granularity. Our focus is on small clusters of static underwater nodes scattered in a small area. Examples of applications these clusters can be used for are monitoring vibrations around a site for an underwater oil-drilling site or monitoring the entry of a harbour for security reasons. Our aim is to provide communication between nodes, position estimation of nodes and time-synchronisation simultaniously through designing an integrated MAC. Existing work on time-synchronisation [1], localization [2] and communication [3] [4] consider these three aspects individualy and does not consider their impact on each other. For example papers proposing scheduled communication do not consider the localization and time-synchronisation aspects of a system, even though position estimation and time-synchronisation are required for the scheduling to work properly. Papers proposing time-synchronisation such as [1], require an estimate of the propagation delay between nodes, Fig m 500m 500m Sensor node Cluster head Communication Example of a 3d deployment of an underwater cluster however do not consider their impact on communication. Related work tends to limit its focus rather than looking at complete MAC protocol designs. In this paper we propose a MAC protocol for combined time-synchronisation, localization and communication scheduling approach for small underwater clusters. Localization requires propagation-delays to estimate distances between nodes, communication scheduling requires the delays to calculate a collision-free schedule, and time-synchronisation requires the propagation delay to provide accurate results. Therefore it makes sense to combine these algorithms in a single MAC protocol and reuse propagation delay measurements to determine node position and to do time-synchronisation and communication scheduling. The MAC protocol that we propose provides means to measure the propagation delays and use this information to schedule communication, determine the position of nodes, and provide time-synchronisation. Regarding localization, we provide relative position estimation. Our aim is to provide the localization service without requiring any setup phase for reference nodes. We see this as a significant benefit in terms of practical deployment of underwater sensor networks. Determining the positions of reference nodes under water can be difficult and requires the use of external positioning systems such as a Ultra Short Baseline (USBL) system attached to a boat or use of surface beacons equiped with GPS. When only relative positions are required, /12 $ IEEE DOI /ICCSE
2 (a) Exclusive access (b) Scheduled Fig. 2. Example of how scheduling can improve the throughput of underwater communication. such as for communication scheduling, time-synchronisation or distributed beamforming, not having to configure reference nodes provides significant benefits in terms of easy, fast and cheaper deployment of such a network. Our MAC protocol combines localization, timesynchronisation and communication in a way not done before. Traditionaly underwater MAC protocols have focused on a single aspect only. In this paper we will show a design for a MAC protocol which combines all three aspects for underwater networks. Also we consider the overhead required for scheduled communication. Before scheduled communication can be applied, the nodes in the network need to be synchronised and localized. Rather than assuming position and time-synchronisation to be given, we consider the overhead of an unscheduled communication phase required for determining these positions and time-synchronisation. We have evaluated this overhead in simulation and will show the required data-rates for an acceptable overhead. Previously we have looked at scheduling communication in underwater acoustic networks to reduce collisions, improve throughput, and reduce energy consumption. This resulted in a simplified scheduling approach described in [3], a distributed scheduling approach described in [5], and a combined timesynchronisation and localization system described in [10]. Figure 2 illustrates an example on how spatial-temporal scheduling can be used to mitigate the effects of the low propagation speed of the acoustic signal and on how it improves the throughput of underwater communication. Different from traditional scheduling approaches which require position information, in this paper we propose to use measured propagation delays between nodes for scheduling. This measured propagation delay is in practice enough to provide scheduled communication. These propagation delay measurements can then also be used to determine relative positions of nodes using multidimensional scaling (MDS) [6]. Using propagation delays measurements it will also be possible to provide time-synchronisation on the nodes which can be used for time-stamping measurements and also is required for scheduled communication approaches. The rest of this paper is organised as follows: In Section II we describe the related work in the areas of localization, timesynchronisation and communication scheduling in underwater acoustic networks. Section III describes the proposed design of the MAC protocol followed by Section IV in which we evaluate the performance of the MAC protocol to finish the paper with the conclusion in Section V. II. RELATED WORK Underwater localization has been traditionally done with acoustic signals. Propagation delay information and angular information can be used to estimate the position of the blind nodes. Using propagation delay information between blind nodes, relative positioning can be performed without requiring reference nodes with known position. This relative positioning can be done using multidimensional scaling. An example of such a system is shown in [2], which uses stressmajorization [7] to determine the relative positions of nodes in underwater acoustic networks. The article discusses some issues encountered when doing underwater localization and does some performance measurements on multidimensional scaling for underwater applications. For time-synchronisation in underwater acoustic networks much work has been done already. An example of a timesynchronisation protocol which can be used is TSHL [1], which shows that for time-synchronisation also an estimation of the propagation delay between the reference node and the unsynchronised node is needed. This is because propagation delays are more significant in acoustic networks than in radiobased networks and therefore clock-skew has a more significant impact on the accuracy of the synchronisation accuracy. TSHL is based on first estimating the clock-skew of a node and then calculating the clock-offset using a clockskew corrected estimation of the propagation delay between two nodes. The same (clock-skew corrected) information on the propagation delay between two nodes is required by localization and communication scheduling approaches. Communication scheduling has been researched also and has resulted in scheduling algorithms such as ST-MAC [4], Stump [8] and Simplified Scheduling approach [3]. These scheduling algorithms use position information of nodes to determine propagation delays, but in practice require only propagation delay information between nodes to function. For the design of our MAC protocol we chose to use our Simplified Scheduling algorithm [3], although other scheduling algorithms can be used as well. The simplified scheduling uses scheduling constraints to determine the delay between two transmissions. III. DESIGN By looking at the related work, it becomes evident that localization, time-synchronisation and communication scheduling all require information on propagation delays between nodes to function properly. The operation of our designed protocol as shown in Figure 3 is divided in a coordination and communication phase. Initially the network is in the coordination phase, in which nodes do range measurement between themselves and all other nodes in the network. Once all propagation delays between all pairs of nodes are known, all nodes can run a multidimensional scaling algorithm to determine their own position and position 667
3 of all other nodes. The nodes are also able to synchronise their clocks using the time-information from the other nodes. The cluster-head will determine the routing and scheduling of the network. We assume the cluster-head is preconfigured and all nodes know the network identifier of the clusterhead. The cluster-head will also determine when the network switches from the coordination phase to the communication phase. This is done by broadcasting the schedule for the communication phase. All nodes within the network will follow the schedule for the communication period and will fallback to the coordination phase once the schedule has finished. In the following sections we will look at how these two different phases are implemented, i.e. how coordination and scheduling is done and how information from the coordination phase can be used for relative localization and timesynchronisation. A. Coordination phase The coordination phase of the MAC protocol is all about determining the propagation delays between nodes and establishing time-synchronisation between nodes. The coordination phase of our MAC protocol is done using broadcast messages. Initialy the nodes are all unsynchronized and unaware of other nodes within the cluster. All nodes are assumed to have a preconfigured unique identifier and a preconfigured transmission interval. This phase is the initial coordination phase. Nodes will transmit broadcast message at a random time and will listen for broadcast messages from other nodes when not transmitting. The content of the broadcast messages is described in Figure 4. The broadcast message contains the source address of the node and contains a processing delay allowing other nodes to do round-trip time measurements to the node. The round-trip is the time required to send a message to a node and for the node to send a message back. The time required to do a round-trip is dependant on the distance between two nodes and the propagation speed of the acoustic signal. Figure 5 shows how round-trip time measurements can be done using the processing delay in the broadcast message. When node 3 sends a broadcast message, this message will be received by node 1. Node 1 will measure the time between receiving the broadcast message from node 1 and sending its own broadcast message. This information is stored in the processing delay field of the broadcast message. When node 3 receives the broadcast from node 1, it can measure the round-trip time and substract the processing delay on node 1. This information can be used to calculate the distance and the propagation delay of the acoustic signal between the two nodes. For the protocol to properly function, a minimum initial coordination phase time is required. This time is dependent on several parameters, namely: the total number of nodes within the cluster, dimensions of the cluster and the packet error rate. The protocol also requires a sending interval to be used during the coordination phase. This interval is the average sending Node 1 Node 2 Node 3 Fig. 5. Node 3 processing time Node 2 processing time BC BC Node 2 roundtrip time Node 3 roundtrip time Time BC BC Timeline for sending beacons and measuring propagation delays interval at which the nodes send out broadcast messages during the coordination phase. In the coordination phase, we use pure ALOHA and calculatethe optimal sending rate (G) can be calculated [9]. From the simulation resuls (Section IV) it becomes clear that the coordination phase can take a significant amount of time. Once the initial coordination is done, time required by the subsequent coordination phases can be shorter. If we reuse propagation delay measurements from previous coordination phases the next coordination phase will only update existing propagation delay measurements and therefore will be performed even faster. Communication of sensor data is done during the communication phase. In the following subsections we will look at localization and time-synchronisation, done during the coordination phase, and communication done during the communication phase. 1) Localization: Once all pair-wise propagation delays are measured, relative localization can be done using multidimensional-scaling. We can calculate the distance between two nodes denoted as δ i,j using the measured propagation delay denoted as t i,j and an estimat of the sound speed under water (v sound 1500m/s) as follows: δ i,j = 2 v sound We use these distance estimates in the dissimilarity matrix δ expressed as: δ 1,1 δ 1,2... δ 1,i δ = δ 2,1 δ 2,2... δ 2,i δ i,1 δ i,2... δ i,i The goal of multidimensional scaling is, using this dissimilarity matrix δ, to find the position vectors of the nodes x 1,..., x i R 3. This can be done by minimizing the following cost function: t i,j min w i,j ( x i x j δ ij ) 2 (1) x 1,...,x i i<j Where x i x j is the Euclidian distance between two vectors. This can be done using an iterative steepest descent approach as described by Kruskal [6]. However the iterative 668
4 Coordination Communication Communication Communication Communication Time 15 min 55 min 5 min Fig. 3. Timeline of a network in operation Field Size Description length 1 byte Length of packet type 1 byte Type of packet (coordinate) source 1 byte Unique identifier of source node time 8 bytes Time in μsec processing.delay[16] 2 bytes Delay between last received broadcast and sending of this broadcast measured.rtt[16] 2 bytes Measured round-trip time with neighbour node Total 74 bytes Fig. 4. Information contained in round-trip time measurement broadcast message majorization approach described by Van Leeuw [7] provides a significantly better approach in terms of guarantees on, and rate of, convergences. Therefore we chose to use the iterative majorization approach. Using weights it is possible to calculate the position of nodes even when pair-wise distance measurements are unavailable. When a distance measurement is unavailable, we use 0 for its weight. It is also possible to use the inverse distance estimate of a link. This means that when the measurement from δ i,j is unavailable, we use the measurement from δ j,i. In theory it is possible to use multidimensional scaling with weights to estimate the missing propagation delays. This allows the cluster-head to do the scheduling faster, allowing the network to spend less time in the coordination phase and more in the communication phase. 2) Time-Synchronisation: Using the TSHL [1] approach it is possible to do time-synchronisation. Using the measured arrival times of the beacon messages from other nodes it is possible to get an estimation of the clock skew. Because we measure the propagation delay during the coordination phase, it is also possible to accurately determine the clock offset. The time-synchronisation will be done during the coordination phase as well. By measuring the reception time of message of a neighbour, the clock-skew of the local node in relation with this neighbour can be estimated. By measuring the clock-skew in relation with all neighbours in the network, an average clock-skew can be calculated. Because round-trip time information is available, the propagation delay of a packet can be estimated. This information can be used to determine the clock-offset at the local nodes. This is done by looking at the transmission time of the packet (which is stored in the broadcast packet) and using the propagation delay. B. Communication During the communication phase, the actual sensor data transmission is performed. Rather than using unscheduled Field Size Description length 1 byte Length of packet type 1 byte Type of packet (Schedule) time start 4 byte Start time of schedule in seconds time end 4 byte End time of schedule in seconds time interval 4 byte Interval between schedule iterations in seconds total.links 1 byte Total number of links source[i] 4 bits Source node of link[i] dest[i] 4 bits Destination node of link[i] time[i] Total Fig. 6. Time when the packet can be send in 2 bytes ms 14 + (total.links 3) bytes Information contained in schedule message communication, the communication during the communication phase is scheduled. The cluster-head is responsible for calculating the schedule and will broadcast the schedule to be used during the coordination phase. The content of a schedule broadcast message is shown in Figure 6. Before calculating a schedule, the cluster-head will first determine the routing in the network. For example in a datacollection network, the cluster-head will schedule all nodes to send their measurements to a gateway node. Other communication patterns can also be scheduled, according to the requirements of the application at hand. In case the cluster-head can not make the routing decision, the cluster-head may schedule broadcast messages for all nodes. In this way, the node itself may make a decision on which node to address. In the schedule packet a broadcast message is denoted by setting the source and destination field of a link to the same value. For scheduling the transmissions, the Simplified Scheduling algorithm is used. The difference with the existing scheduling algorithm is that rather than using the positions of nodes to estimate the distance between two nodes we can use the measured propagation delays. The function T (src, dst) used 669
5 δ j.start δ i.start + δ i.duration δ j.start δ i.start + δ i.duration + T (δ i.src, δ j.src) δ j.start δ i.start + δ i.duration + max( T (δ i.src, δ i.dst) T (δ j.src, δ i.dst), T (δ i.src, δ j.dst) T (δ j.src, δ j.dst)) δ j.start δ i.start if δ i.src = δ j.src if (δ i.src = broadcast or δ j.src = broadcast) and Interfer(δ i.src, δ j.dst) if δ i.src! =δ j.src and Interfer(δ i.src, δ j.dst) otherwise (2) Fig. 8. Extended set of simplified scheduling constraints allowing broadcast scheduling. Scheduled time start Fig. 7. time interval Idle Time Scheduled Idle time end Example of different time denoters in communication phase by the simplified constraints from Figure 8 can be replaced by a lookup of the measured propagation delay. To estimate the propagation delay between node i and node j, the average of the measured propagation delay t i,j and t j,i is used. For scheduling the transmissions, we use the algorithm from [5]. This algorithm is shown in Figure 9. What the algorithm does is simply keeping a minimum starting times for all transmissions. From all these possible starting times, the minimum time is selected and this transmission is to be scheduled next. The starting time of this transmission is now fixed and all unscheduled transmissions are updated. This is done by taking the maximum of the already calculated starting time and the minimum starting time between the transmission and the just scheduled transmission. This is repeated until all transmissions are scheduled. In Figure III-B the time parameters of the schedule are explained. The communication schedule is repeated between time start and time end, this is done with an interval time interval. The schedule itself may be shorter than the interval period. This results in a idle period between different schedule runs. The time when a node can send its scheduled packet (time[i] in the schedule) is calculated relative to the start of an interval. In Figure 10 the content of a data message is described. The packet contains the identifier of the source and destination nodes. Again, the source and destination identifiers are the same if the message is a broadcast message. The data field contains the packet data. The data messages described in Figure 10 are only sent on the scheduled time as calculated by the cluster head. The reception of the data message is therefore as well determined. A node may choose to listen only when scheduled data messages are expected and turn off its modem when it is not expecting any data, thus conserving energy. V transmissions {Set of all transmissions} schedule [N] =0{Resulting schedule} schedule[0] = 0 {Schedule the first transmission} time =0 last =0 V V \ δ 0 {Remove transmission from set} {Scheduling loop schedules transmissions greedy} while!empty(v ) do time min infinity {Calculate minimum starting time for remaining transmissions} for δ V do schedule[δ index ] = max(schedule[δ index ],time + constraint(δ last,δ index )] {See if this transmission has the smallest starting time} if schedule[δ index ] <time min then time min schedule[δ index ] index δ index end if end for {Schedule transmission with smallest starting time first} time = time min last = index V V \ δ index end while Fig. 9. Reduced complexity algorithm for scheduling transmissions. Field Size Description length 1 byte Length of packet type 1 byte Type of packet (Data) source 4 bits Unique identifier of source node destination 4 bits Unique identifier of destination node data x bytes Packet data Total 3+x bytes Fig. 10. Information contained in data message IV. PERFORMANCE EVALUATION For the performance evaluation, we assume a network of 16 nodes randomly deployed on an area of 500mx500m. We assume nodes are able to communicate with any other node at the rate of 1000bps. In this scenario we run the MAC protocol and measure how long coordination phase takes, if we measure (1) all pairwise propagation delay or (ii) we require only one of the pairwise propagation delays (either t i,j or t j,i ). We also measure the time until the cluster-head detects all nodes in the network. The result are shown in Figure 11(a). We have compared the approach of relative localization with 670
6 an approach in which beacons are used. This approach is similar to the approach we have shown in [10]. In this scenario 5 out of 16 nodes in the cluster are preconfigured with a position and the other nodes will listen to these beacons to determine their position. Once they determine their position they will start broadcasting their position information as well. The information of the round-trip time measurements in the broadcast messages are replaced with the position in this scenario. The coordination phase finishes when the clusterhead collects the position information from all nodes within the network. From the results we can see that using low modulation rates, it takes a considerable time before all nodes in the cluster are detected and all pair-wise measurements are performed. When a modulation rate of 5000 bps or higher is used, the setup times become acceptable. The number of bytes sent during the coordination phase is shown in Figure 11(b). The number of bytes sent is largely independent of the modulation rate. Comparing the relative scheduling approach to an approach in which preconfigured beacons are used, we can see that the approach using preconfigured beacons performs much better. For the lower data rates, it seems using preconfigured beacons is the only viable option, because the coordination times for round-trip measurements are too large. For the higher data rates, using preconfigured beacons still outperforms the completely relative localization scenarios. However not having to preconfigure beacons may be benificial in certain use cases. In scenarios in which beacons can not be preconfigured or when absolute coordinates are not required at the nodes, relative positioning provides a suitable approach for higher data rates. Regarding the efficiency of the scheduled communication, we calculate two types of schedules for the communication phase: one with all nodes sending data to a single node (a data-collection network) and one in which all nodes are scheduled a broadcast message. The latter case allows the nodes themselves to do the routing decision. We see these two scenarios as typical use-case scenarios for our designed MAC protocol. The resulting schedule lengths are shown in Figure 12. We also evaluate the performance of the multidimensional scaling localization approach. This performance is dependant on the range-estimation error. We model the range estimation error as a normal distribution N (0,σ 2 ) with the value σ 2 set to the values of 1% to 10% of the range. We use Matlab to calculate the positions of the nodes and compared them to the real positions of the nodes. We run this for 100 random deployments, the values of the absolute errors can be seen in Figure IV. (a) Time required for coordination (b) Number of bytes send Fig. 11. Measurement of coordination phase at different modulation rates Fig. 12. Schedule lengths for all 16 nodes sending 128 bytes V. CONCLUSION We have shown a design for a MAC protocol, which combines scheduled communication, localization and timesynchronisation. This MAC protocol is designed for small cluster with limited number of nodes. Because scheduled communication, localization and time-synchronisation require Fig. 13. Accurary of localization. 671
7 measurement of propagation delays, we consider an integrated MAC design to be important. The operation of the MAC protocol is split into two phases: The first phase, the coordination phase, is used to measure the propagation delays between nodes. The second phase, the communication phase, is used to communicate sensor data. After the coordination phase, all propagation delays between the nodes are known and a localization algorithm can be run. We applied multidimensional scaling to determine the relative positions of all nodes in the cluster. We also showed that timesynchronisation can be established after the coordination phase and a communication schedule for the communication phase can be calculated. During the communication phase, nodes communicate using scheduled communication. Using the measured propagation delays we show how a communication scheduled for this phase can be calculated. Our work is novel because it provides a combined MAC protocol for localization, time-synchronisation and communication. Traditional MAC protocols consider these three aspects separately. We have perfomed measurements on the two phases of the protocol. We have shown that to get reasonable setup times for the coordination phase an modulation rate of at least 5000bps is required. We have compared the relative positioning approach to an approach where beacons with known positions are used. When beacons with known positions are used, the coordination phase can be done significantly quicker. For lower data rates (1000 bps) relative positioning does not seem to be a viable approach. In these scenarios beacons with known positions should be used to provide acceptable coordination phase times. For higher data rates relative positioning does provide acceptable coordination phase times. Using beacons with known positions still outperform relative positioning. However for certain applications setting up reference nodes may be too time consuming and require costly equipment for deployment. Also some applications may not require absolute position information on the nodes. For these types of applications, using relative positioning for underwater networks is a viable approach. [4] C.-C. Hsu, K.-F. Lai, C.-F. Chou, and K. C.-J. Lin, St-mac: Spatial-temporal mac scheduling for underwater sensor networks. in INFOCOM. IEEE, 2009, pp [Online]. Available: [5] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, Mac scheduling in large-scale underwater acoustic networks, in 8th International Joint Conference on e-business and Telecommunication, ICETE 2011, Sevilla, Spain. USA: IEEE Computer Society, July 2011, pp [6] J. Kruskal, Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis, Psychometrika, vol. 29, pp. 1 27, 1964, /BF [Online]. Available: /BF [7] J. de Leeuw, Applications of convex analysis to multidimensional scaling, in Recent Developments in Statistics, J. Barra, F. Brodeau, G. Romier, and B. V. Cutsem, Eds. Amsterdam: North Holland Publishing Company, 1977, pp [8] K. Kredo II and P. Mohapatra, Distributed scheduling and routing in underwater wireless networks, Globecom 2010, [9] A. Tanenbaum, Computer Networks, 4th ed. Prentice Hall Professional Technical Reference, [10] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, Scheduled mac in beacon overlay networks for underwater localization and timesynchronization, in The Sixth ACM International Workshop on Underwater Networks (WUWNet), Seattle, USA. New York: ACM, December 2011, p. 6. ACKNOWLEDGMENT This work is supported by the SeaSTAR project funded by the Dutch Technology Foundation (STW) and the European Commission under the 7th Framework Programme (grant agreement no CLAM). REFERENCES [1] A. A. Syed and J. Heidemann, Time synchronization for high latency acoustic networks, in In Proc. IEEE InfoCom, [2] K. Y. Foo and P. R. Atkins, A relative-localization algorithm using incomplete pairwise distance measurements for underwater applications, EURASIP J. Adv. Signal Process, vol. 2010, pp. 11:1 11:7, January [Online]. Available: [3] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, A set of simplified scheduling constraints for underwater acoustic mac scheduling, in The 3rd International Workshop on Underwater Networks (WUnderNet-2011), Singapore. Singapore: IEEE Computer Society, March 2011, pp
Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol
Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol Salvador Climent 1 Nirvana Meratnia 2 Juan Vicente Capella 1 1 Universitat Politècnica de València
More informationExperimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks
Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,
More informationDistributed Scheduling and Routing in Underwater Wireless Networks
Distributed Scheduling and Routing in Underwater Wireless Networks Kurtis Kredo II Electrical and Computer Engineering Dept. California State University, Chico kkredo@csuchico.edu Prasant Mohapatra Computer
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationMAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationReservation Packet Medium Access Control for Wireless Sensor Networks
Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for
More informationR-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks
R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are
More informationReliable and Energy Efficient Protocol for Wireless Sensor Network
Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India
More informationAn Optimized Time Synchronization Algorithm for Mobile Submarine Sensor
IJCTA, 9(12), 2016, pp. 5727-5731 International Science Press 5727 An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor Networ orks *L. Sivagami **J.Martin Leo Manickam, Member, IEEE
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More informationA Survey on Underwater Sensor Network Architecture and Protocols
A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationReliable Time Synchronization Protocol for Wireless Sensor Networks
Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationAN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More informationMID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions
MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions Jean-Yves Le Boudec 2005 December 8 Do not forget to put your names on all sheets of your solution. If you need to make assumptions in order
More informationIRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network
IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network Md. Abir Hossain Department of Information and Communication Technology (ICT), Mawlana Bhashani Science and Technology University
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationGeographical Routing Algorithms In Asynchronous Wireless Sensor Network
Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-
More informationAbstract. 1. Introduction. 2. Theory DOSA Motivation and Overview
Experiences with Implementing a Distributed and Self-Organizing Scheduling Algorithm for Energy-Efficient Data Gathering on a Real-Life Sensor Network Platform Yang Zhang, Supriyo Chatterjea, Paul Havinga
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationQoS-Enabled Video Streaming in Wireless Sensor Networks
QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationA Two-phase Distributed Training Algorithm for Linear SVM in WSN
Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January-2016 1631 Innovative Routing and Time Synchronization in Underwater Sensor networks Vidya.R 1, Ambika.G.N 2, P Haripriya
More informationLuca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007
Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Outline Motivations Intro to consensus algorithms
More information298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016
298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., JANUARY 206 Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks Shijun Lin, Member, IEEE, Liqun Fu, Member, IEEE, Jianmin Xie,
More informationDynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks
Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese
More informationSURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS
SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationOptimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization
Optimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India Jibendu
More informationA JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks
A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks Mingsheng Gao Computing Laboratory National University of Singapore mingsh.gao@gmail.com Hui Jiang Department of Computer Science
More informationPerformance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless
More informationPerformance of DSMA/CD in CDPD Networks
Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data
More informationFTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks
FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks Van-Thiep Nguyen, Matthieu Gautier, and Olivier Berder University of Rennes 1, IRISA, France, {van-thiep.nguyen,matthieu.gautier,olivier.berder}@irisa.fr
More informationAn Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks
An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks Yoh-han Lee Department of Electrical Engineering Korea Advanced Institute of Science & Technology Daejeon, KOREA yohhanlee@kaist.ac.kr
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationPower-efficient Communication Protocol for Social Networking Tags for Visually Impaired
Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology
More informationUnavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
More informationComparison of Two Synchronization Protocol in Wireless Sensor Network
Comparison of Two Synchronization Protocol in Wireless Sensor Network S.Rucksana 1, C. Babu 2, S.Saranyabharathi 3 P.G. Scholar, Department of ECE, Knowledge Institute of Technology, Salem, Tamil Nadu,
More informationChoosing the Packet Size in Multi-hop Underwater Networks
Choosing the Packet Size in Multi-hop Underwater Networks Stefano Basagni, Chiara Petrioli, Roberto Petroccia and Milica Stojanovic ECE Department Northeastern University {basagni, millitsa}@ece.neu.edu
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationTri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks
Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks Chen Tian 1 Hongbo Jiang 1 Xue Liu 2 Xinbing Wang 3 Wenyu Liu 1 Yi Wang 1 1 Department of EIE,
More informationMultichannel MAC for Energy Efficient Home Area Networks
1st International Workshop on GReen Optimized Wireless Networks (GROWN'13) Multichannel MAC for Energy Efficient Home Area Networks Kok Keong Chai, Shihab Jimaa, Yun Li, Yue Chen, and Siying Wang Abstract
More informationA Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationAn Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks
An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,
More informationReservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing
2013 8th International Conference on Communications and Networking in China (CHINACOM) Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing Shuo Shi, Xue Wang and Xuemai
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationA MAC Protocol with Little Idle Listening for Wireless Sensor Networks
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin
More informationExperiment report. Figure 1: Deployment location
Experiment report 1. Experiment time: July 30th, 2015 2. Experiment location: receiving Node (MID3) was placed at Pocock rowing center and two source nodes (MID1, MID2) were setup in APL location. Figure
More informationAn Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks
Article An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Faisal Alfouzan *, Alireza Shahrabi, Seyed Mohammad Ghoreyshi and Tuleen Boutaleb School of Engineering and Built Environment,
More informationExperimental Node Failure Analysis in WSNs
Experimental Node Failure Analysis in WSNs Jozef Kenyeres 1.2, Martin Kenyeres 2, Markus Rupp 1 1) Vienna University of Technology, Institute of Communications, Vienna, Austria 2) Slovak University of
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationCPSC 441 Tutorial-19. Department of Computer Science University of Calgary
CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.
More informationEnhanced Power Saving Scheme for IEEE DCF Based Wireless Networks
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationLow Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle
24 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 212 Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle Jeehoon Lee*, Jongsoo Jeong,
More informationTwo-Tier WBAN/WLAN Healthcare Networks; Priority Considerations
Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationComputer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48
Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationEfficient Surface Gateway Deployment. For Underwater Sensor Networks
1 Efficient Surface Gateway Deployment For Underwater Sensor Networks Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut,
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationSynchronization in Sensor Networks
Synchronization in Sensor Networks Blerta Bishaj Helsinki University of Technology 1. Introduction... 2 2. Characterizing Time Synchronization... 2 3. Causes of clock desynchronization... 3 4. Algorithms...
More informationEnergy-Aware Routing in Wireless Ad-hoc Networks
Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationAN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS
International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail
More informationSabareesan M, Srinivasan S*,John Deva Prasanna D S
Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationA Hybrid Medium Access Control Protocol for Underwater Wireless Networks
A Medium Access Control Protocol for Underwater Wireless Networks Kurtis B. Kredo II Electrical and Computer Engineering Dept. University of California, Davis kbkredo@ucdavis.edu Prasant Mohapatra Computer
More informationDistributed Interference-aware Medium Access Control for IEEE Visible Light Communications
Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok
More informationImproving Channel Scanning Procedures for WLAN Handoffs 1
Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationEvent-based sampling for wireless network control systems with QoS
21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationConnectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks
Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University
More informationProceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationA Low-Energy Adaptive and Distributed MAC Protocol for Wireless Sensor-Actuator Networks
Institut Eurécom Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia-Antipolis FRANCE Research Report RR-06-161 A Low-Energy Adaptive and Distributed MAC Protocol for Wireless
More informationOptimization on TEEN routing protocol in cognitive wireless sensor network
Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationPATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks
PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks Haixia Tan, Weilin Zeng and Lichun Bao Donald Bren School of Information and Computer Sciences University of California,
More informationChapter 6 Time synchronization
Chapter 6 Time synchronization Outline 6.1. The Problems of Time Synchronization 6.2. Protocols Based on Sender/Receiver Synchronization Network Time Protocol (NTP) Timing-sync Protocol for Sensor Networks
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationCOMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK
International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD
More informationRandomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching
Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks
More informationAn AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks
An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks Youn-Sik Hong 1 and Ki-Young Lee 2 1 Department of Computer Science and Eng. 2 Department of Information and Telecommunication Eng.,
More information